YoVDO

Tracking Browser Fingerprint Evolutions - Antoine Vastel

Offered By: IEEE via YouTube

Tags

Browser Fingerprinting Courses Cybersecurity Courses Machine Learning Courses Privacy Courses Data Protection Courses

Course Description

Overview

Explore the evolution of browser fingerprinting techniques and their implications for user tracking in this IEEE conference talk. Delve into the FP-STALKER approach, which links browser fingerprint evolutions to enable long-term tracking despite frequent changes. Learn about the rule-based and hybrid variants of FP-STALKER, and examine the results of an empirical study involving nearly 100,000 fingerprints from over 1,900 distinct browser instances. Discover how this innovative method can track browsers for an average of 54.48 days, with some browsers being trackable for more than 100 days. Gain insights into the broader implications of fingerprinting, fingerprint uniqueness, and the challenges of maintaining user privacy in the face of evolving tracking technologies.

Syllabus

Introduction
Browser fingerprinting
Broader fingerprint
Fingerprint uniqueness
Fingerprint Tracking
Rulebased Algorithm
Random Forest
Vectorization
Random Forest Model
Evaluation
Fingerprint Sequence
Chains
Tracking Duration
Ownership
Average Ownership
IP Version
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

OPSEC and Personal Security Guide - Cybertalk Episode 7
HackerSploit via YouTube
Introduction to Operational Security
CAE in Cybersecurity Community via YouTube
XHOUND - Quantifying the Fingerprintability of Browser Extensions
IEEE via YouTube
The State of Credential Stuffing and the Future of Account Takeovers
OWASP Foundation via YouTube
Breaking Fraud and Bot Detection Solutions
OWASP Foundation via YouTube